DHCP option injector
☆42Jul 7, 2020Updated 5 years ago
Alternatives and similar repositories for dhcpoptinj
Users that are interested in dhcpoptinj are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- File transfer via DNS☆76May 21, 2017Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Passive DHCP fingerprinting implementation☆52Jul 12, 2016Updated 9 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- A simple program that will take packets from a netfilter queue and alter their source or destination IP address☆12Mar 28, 2014Updated 12 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Capturing, analysing and responding to cyber attacks☆173Sep 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Linux generic dhcp snooping daemon using nflog and ebtables or nftables☆57Nov 16, 2022Updated 3 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A http package for IncludeOS☆14Dec 1, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- Transparent Proxy configuration for DD-WRT router☆14Mar 4, 2016Updated 10 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆10Jun 7, 2019Updated 6 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 12 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆100Aug 26, 2019Updated 6 years ago
- Phishing toolkit for red teams and pentesters.☆125Jun 1, 2018Updated 7 years ago
- Python tools for manipulating Mikrotik NPK format☆85Jun 9, 2015Updated 10 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Feb 1, 2017Updated 9 years ago